Sciweavers

1928 search results - page 230 / 386
» Integrity Constraints in OWL
Sort
View
98
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Beating nyquist through correlations: A constrained random demodulator for sampling of sparse bandlimited signals
Technological constraints severely limit the rate at which analog-todigital converters can reliably sample signals. Recently, Tropp et al. proposed an architecture, termed the ran...
Andrew Harms, Waheed U. Bajwa, A. Robert Calderban...
115
Voted
PERCOM
2011
ACM
14 years 4 months ago
Using prediction to conserve energy in recognition on mobile devices
—As devices are expected to be aware of their environment, the challenge becomes how to accommodate these abilities with the power constraints which plague modern mobile devices....
Dawud Gordon, Stephan Sigg, Yong Ding, Michael Bei...
119
Voted
EDOC
2011
IEEE
14 years 18 days ago
Resource and Agreement Management in Dynamic Crowdcomputing Environments
Abstract—Open Web-based and social platforms dramatically influence models of work. Today, there is an increasing interest in outsourcing tasks to crowdsourcing environments tha...
Harald Psaier, Florian Skopik, Daniel Schall, Scha...
123
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
Towards temporal access control in cloud computing
—Access control is one of the most important security mechanisms in cloud computing. Attribute-based access control provides a flexible approach that allows data owners to integ...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang,...
INFOCOM
2012
IEEE
13 years 3 months ago
Submodular game for distributed application allocation in shared sensor networks
Abstract—Wireless sensor networks are evolving from singleapplication platforms towards an integrated infrastructure shared by multiple applications. Given the resource constrain...
Chengjie Wu, You Xu, Yixin Chen, Chenyang Lu